ZyXEL Communications 4.6 ユーザーズマニュアル
Chapter 17 Maintenance Screens
Media Server User’s Guide
316
The screen is also the same for the Create a certificate authorized by other CA option.
Figure 184
Maintenance > SSL > Create or Edit a Certificate
The following table describes the labels in this screen.
17.7 The Shutdown Screen
Use this screen to turn off the NSA or perform a software restart. A software restart is faster than
turning the NSA off and then turning it on again. Before shutting down or restarting, check the
System Status > Active Sessions screen to make sure that no one is logged into the NSA or
transferring files to or from the NSA.
turning the NSA off and then turning it on again. Before shutting down or restarting, check the
System Status > Active Sessions screen to make sure that no one is logged into the NSA or
transferring files to or from the NSA.
Table 118
Maintenance > SSL > Create or Edit a Certificate
LABEL
DESCRIPTION
Common Name
This name describes the certificate’s origin, either in the form of an IP address or a
domain name.
domain name.
Host IP Address
Select this option and enter the NSA’s IP address if you want to use this for the
common name.
common name.
Host Domain Name
Select this option and enter the NSA’s domain name if you want to use this for the
common name
common name
Organizational Unit
(Optional)
(Optional)
Enter this name of the organizational unit which owns or maintains the NSA. This is
an optional field.
an optional field.
Organization (Optional)
Enter this name of the organization or company which owns or maintains the NSA.
This is an optional field.
This is an optional field.
Country (Optional)
Enter this name of the country in which the NSA is located. This is an optional field.
Key Type
Select the certificate’s key type, either RSA or DSA. RSA is a public-key encryption
and digital signature algorithm, while DSA is only a digital signature algorithm.
and digital signature algorithm, while DSA is only a digital signature algorithm.
Key Length
Select the encryption key length. The longer the key, the better the encryption
security. The only drawback to having a long key is that the file encrypted with it
swells in size as well.
security. The only drawback to having a long key is that the file encrypted with it
swells in size as well.
Apply
Click this to save your changes.
Cancel
Click this to discard changes and close the window.